#habilitando roteamento entre as interfaces por padrão
#valor vem igual a 0 cat /proc/sys/net/ipv4/ip_forward echo 1 cat /proc/sys/net/ipv4/ip_forward valor 1 ---> montando servidor dhcp <-- #definindo a interface static jed /etc/networking/interface the loopback network interface auto lo eth0 eth1 iface lo inet loopback
#iface eth0 inet dhcp
#iface eth1 inet static address 172.16.0.1 netmask 255.255.255.0 network 172.16.0.0 broadcast 172.16.0.255 restart na interface /etc/init.d/networking restart #configurando o servidor dhcp apt-get install dhcp3-server jed /etc/dhcp/dhcpd.conf #aplicando o dns cat /etc/resolv.conf 10.9.0.1 ddns-update-style none; option domain-name-servers 10.9.0.1; default-lease-time 600; max-lease-time 7200; log-facility local7; subnet 172.16.0.0 netmask 255.255.255.0 { range 172.16.0.101 172.16.0.200; option broadcast-address 172.16.0.255; option routers 172.16.0.1; } #definindo a interface para fornece dhcp jed /etc/default/dhcp3 "eth1" ps aux | grep dhc # status processo dhcp #ativando o mascaramento iptables -t nat -A POSTROUTING -s 172.16.0.0/24 -o eth0 -j MASQUERADE #tudo que vinher da tabela nat da saida da interface eth0 mascare #ping em broadcast ping 172.16.0.255 -b # verificando todo trafego na interface eth1 e eth0 apt-get install tcpdump tcpdump -n -i eth1 #trafego interno tcpdump -n -i eth0 #trafego saída para internet route -n tabela de roteamento da subrede destino roteador mascara opções metricas ref uso iface 172.16.0.0 0.0.0.0 255.255.255.0 u 0 0 0 eth1 10.9.0.0 0.0.0.0 255.255.255.0 u 0 0 0 eth0 0.0.0.0 10.9.0.1 255.255.255.0 u 0 0 0 eth0 # capturar trafego na rede,filtra e devemos analisar essas informações atravês do ethe rreal Sniffers Windows ::winpcap or windump linux ::libpcap or tcpdump #analises pacotes trafegos na rede e protocolos windows ::ethereal linux ::ethereal